Skip to content

2023-092: Critical vulnerability in FortiSIEM

Table of Contents

On November 14, Fortinet released an advisory regarding a critical vulnerability affecting FortiSIEM which may allow a remote unauthenticated attacker to execute unauthorised commands via crafted API requests.


FortiSIEM Vulnerability

FortiSIEM Vulnerability

History

  • 20/11/2023 - v1.0 - Initial publication
  • 21/11/2023 - v1.1 - Correction of the CVE ID

Summary

On November 14, Fortinet released an advisory regarding a critical vulnerability affecting FortiSIEM which may allow a remote unauthenticated attacker to execute unauthorized commands via crafted API requests[1].

Technical Details

The vulnerability CVE-2023-36553, with a CVSS score of 9.3 out of 10, is due to an improper neutralization of special elements in FortiSIEM report server. The exploitation of this vulnerability by a remote unauthenticated attacker could lead to the execution of unauthorized commands via crafted API requests.

Affected Products

This vulnerability affects the following versions of FortiSIEM:

  • FortiSIEM 5.4 all versions
  • FortiSIEM 5.3 all versions
  • FortiSIEM 5.2 all versions
  • FortiSIEM 5.1 all versions
  • FortiSIEM 5.0 all versions
  • FortiSIEM 4.10 all versions
  • FortiSIEM 4.9 all versions
  • FortiSIEM 4.7 all versions

Recommendations

It is recommended to update FortiSIEM to the latest version as soon as possible[1].

References


This post was generated entirely by an AI language model. Source: https://cert.europa.eu/

Latest

Szele Tamás: A terjeszkedő Kína

Szele Tamás: A terjeszkedő Kína

Hszi elnök nagy mágus, Putyin elnök nagy harcos, Emomali Rahmon tádzsik elnök pedig... nos, ő az az ember, akinek a véleményére az előző két úr egyáltalán nem kíváncsi.

Members Public